Information on known or suspected fraudulent activities, including identity theft, payment card fraud, or scam patterns, compiled from reported incidents, industry warnings, or shared alerts.
Fraud Data
Related Techniques
- Centralizes reported incidents of unauthorized transactions, phishing attempts, or disputed charges.
- Highlights patterns of disputed activity and connects known fraud events to compromised accounts, aiding in ongoing investigations.
Contains information on known or suspected fraudulent activities (e.g., scam phone numbers, email addresses, and patterns) specifically associated with advance fee fraud schemes. Financial institutions can cross-reference suspicious incoming payments or customer profiles against documented scam indicators, thereby enhancing the detection and investigation of potential 419 or lottery scam transactions.
Fraud data consolidates reported and known fraudulent activities, including:
- Documented patterns of identity theft, payment card fraud, and chargeback-related scams.
- Correlation with known fraudulent profiles or blacklisted entities.
By comparing disputed transactions against known fraud trends, investigators can identify malicious patterns underlying fraudulent chargebacks more quickly.
- Aggregates known or suspected fraudulent wallet addresses, flagged entities, and scam patterns.
- Correlates donor or organizational information with existing fraud databases to identify potential illicit involvement or repeated risk signals.
- Helps detect addresses using mixing or tumbling services previously associated with suspicious activity.
- Consolidates records on known or suspected fraudulent activities, including stolen checks, identity theft incidents, and frequently used scam techniques.
- Enables cross-referencing of ongoing check fraud patterns or flagged payors with existing fraud alerts, supporting earlier detection of high-risk deposits.
- Contains records of known fraudulent payment methods or compromised payment cards.
- Enables detection of deposits originating from stolen cards or flagged payment sources used to fund chip dumping accounts.
- Supports investigations by correlating fraudulent payment activity with rapid or unusual chip losses to conspirator accounts.
- Consolidates internal and shared industry intelligence regarding fraudulent activities.
- Logs incidents of suspected or confirmed counterfeit currency, such as repeated serial numbers or device-flagged anomalies in deposited banknotes.
- Consolidates information on addresses and entities flagged for suspicious or illicit on-chain activities.
- Assists in identifying linkages between cross-chain bridge transactions and known fraudulent addresses or watchlists.
- Facilitates rapid detection of bridging patterns involving addresses previously reported for scams, hacks, or other unauthorized activities.
Consolidates histories of known or suspected fraud incidents, including impersonation scams, associated methods, and impacted accounts.
Helps investigators identify repeat or correlated deepfake-based scams and cross-reference impersonation techniques across multiple customer accounts or institutions.
- Aggregates known or suspected instances of fraudulent activity linked to individuals or entities.
- Identifies parties with a history of document forgery or trade-based fraud.
- Assists in detecting repeat offenders exploiting documentary collection mechanisms.
Compiles details of known or suspected fraudulent activities, including identity theft incidents and document-forgery methods. By matching incoming early superannuation withdrawal requests against these documented fraud patterns, investigators can quickly detect and block potentially forged or stolen identity claims.
- Contains records of known or suspected fraudulent activities, identity theft cases, and scam patterns from industry sources and shared alerts.
- Directly supports the detection of repeat fraudsters or stolen IDs used to apply for relief, enabling proactive identification of potential scams.
- Contains records of known or suspected fraudulent activities, stolen personal data, or compromised identity details.
- Supports cross-referencing newly submitted identity information against blacklists or detected fraud cases to identify potential fake or stolen KYC documentation.
- Compiles lists of flagged or blacklisted entities, accounts, and addresses linked to suspicious or illicit activities.
- Helps identify vendor bank details matching known fraud or sanction databases, suggesting potential fake vendor involvement.
- Contains alerts, reports, and patterns associated with known scams, including telemarketing and phone-based fraud.
- Facilitates the identification of vulnerable individuals, such as older adults, who may have been coerced into sending funds under false pretenses.
- Consolidates reports of known or suspected fraud incidents, alert lists, and scam patterns.
- Helps institutions detect repeat offenders, suspicious methodologies, or new fraud typologies.
- Enables more targeted investigations where similar or identical fraud indicators appear (e.g., false invoicing patterns).
- Aggregates known scam patterns, reported incidents, and suspected fraudulent activity linked to false charitable appeals.
- Supports investigative efforts by matching current fundraising behaviors with established fraud typologies or alerts.
- Collects reported incidents and patterns of identity fraud, including known methods of forging documents or impersonating legitimate customers.
- Allows cross-referencing of suspicious identity profiles against documented fraud cases.
- Enhances detection by highlighting recurring impersonation patterns reported within the institution or by industry alerts.
Aggregated information on known or suspected fraudulent activities includes identity theft reports, compromised personal data, and forged documentation patterns. By cross-referencing customer applications and account changes against these records, financial institutions can identify potential identity manipulation and investigate suspected synthetic or stolen identities more effectively.
- Contains records of compromised payment methods, stolen card details, and prior fraudulent activity.
- Supports identification of high-risk in-game currency acquisitions funded by illicit sources or unauthorized payment methods.
- Includes whistleblower tips, reported allegations of misconduct, and known or suspected internal fraud incidents.
- Helps uncover insider wrongdoing by consolidating internal reports and alerts on potential employee collusion or other misconduct.
- Contains blacklisted addresses, compromised wallets, or known fraudulent accounts associated with prior illicit activity.
- Supports rapid identification of suspected funds derived from or destined for illegal sources when instantly swapped or layered.
- Contains known fraud or financial crime records for individuals or entities.
- Helps identify high-risk parties engaged in questionable insurance or reinsurance schemes.
Compiles reports of known or suspected fraudulent behavior, scam patterns, and associated entities. Financial institutions can cross-reference new investment clients or promoters with existing fraud alerts to identify potential links to previous scams or social engineering efforts.
Provides information on known or suspected fraudulent activities and scam patterns, including reported lottery scam typologies, associated email addresses or phone numbers, and patterns of advance fee fraud. Investigators use these details to cross-reference repeat perpetrators, identify recurring victim complaints, and detect transactions matching known lottery scam behaviors.
Provides records of known or suspected fraud, including scam patterns and reported incidents. This helps flag potential romance or social media recruitment approaches associated with money mule activities and identify accounts linked to similar fraud typologies.
- Contains records of known or suspected fraudulent identities, including stolen or compromised payment credentials.
- Enables detection of accounts opened using fraudulent details or stolen data.
- Helps identify the use of compromised payment cards to fund online gambling accounts, linking suspicious identities to broader fraud patterns.
- Consolidates repositories of known or suspected fraudulent activities related to stolen digital items, compromised gaming accounts, or ongoing scam patterns.
- Enables financial institutions to flag transactions associated with recognized fraudulent game assets, preventing the rapid monetization of illicit tokens.
- Consolidates records on reported and confirmed fraud incidents, including pig butchering scam typologies, associated phone numbers, email addresses, wallet addresses, or websites involved in scams.
- Facilitates early detection by matching new activity against known fraudulent patterns, enabling timely intervention, enhanced investigations, and potential account restrictions.
Provides aggregated records on known or suspected fraudulent checks, forged or altered instruments, and repeated deposit scams. By cross-referencing newly deposited checks with these fraud databases, institutions can identify potential matches or suspicious patterns associated with remote deposit capture more quickly.
- Aggregates known or suspected identity theft records, compromised documents, and other fraud patterns.
- Enables direct cross-checking of user-submitted IDs against known fraudulent profiles, revealing attempts to bypass remote verification with stolen or forged credentials.
- Contains detailed reports of known or suspected fraud incidents, including romance scam tactics and blacklisted identities (e.g., phone numbers, email addresses, account credentials).
- Enables investigators to match ongoing suspicious activity against prior romance scam patterns, quickly identify repeat offenders, and spot recurring stories or ruses typical of romance mule recruitment.
- Facilitates faster detection of emerging scam trends and potential links to organized fraud networks, strengthening AML efforts against romance scam recruiters.
- Contains information on institutions or entities previously flagged for fraudulent activities or compliance breaches.
- Assists in detecting lenders with a history of risky or noncompliant practices, possibly enabling syndicated trade loan manipulation.
- Contains information on known or suspected fraudulent activities, entities, and individuals.
- Flags tax agents or intermediaries with a history of involvement in fraudulent refund schemes.
- Helps uncover networks of repeat offenders and patterns consistent with tax rebate fraud.
- Consolidates information on identity theft, payment card fraud, and scam patterns.
- Supports the detection of stolen or synthetic IDs used in fraudulent unemployment claims by cross-referencing known fraudulent identities.
- Shares industry alerts on emerging unemployment fraud schemes, facilitating early identification of suspicious claims or accounts.
Tracks known or suspected fraudulent activities, including stolen credit cards, compromised accounts, and scam patterns. It helps detect repeated small-value card purchases or suspicious payment methods used to load gaming wallets, which are common tactics for laundering funds in virtual worlds.